Gimme Some Disruptive Innovation!

Hunt, Steve
January 2008
Security: Solutions for Enterprise Security Leaders;Jan2008, Vol. 45 Issue 1, p20
Trade Publication
The author challenges the information technology (IT) sector to bring its products and services to the physical security industry in the U.S. He contends that the short-term outlook does not bode well for the IT sector to deliver physical security changes. He wants the sector to create innovations that can turn on physical security and logical security alike.


Related Articles

  • Establishment of Improved Business Security Systems. Wookjae Cha; Dongho Won // World Academy of Science, Engineering & Technology;Feb2011, Issue 50, p1 

    No abstract available.

  • Spending expected to rise for security, disaster recovery. Dietderich, Andrew // Crain's Detroit Business;11/12/2001, Vol. 17 Issue 47, p17 

    Focuses on the attitude of companies towards security spending in the United States for 2002. Increase in technology purchase for network security, disaster recovery and software backup; Efforts of businesses to secure its data; Growth in sales for the information technology industry.

  • Problems of information security of the firm (manufacture) and a way of their decision. Aleshnikov, Sergey; Demin, Sergey; Fedorov, Sergey; Fjodorov, Alexandr // Vestnik IKBFU;2013, Issue 10, p147 

    Problems of information security of the firm (manufacture) are considered. Their decision assumes studying of forms, ways and methods of revealing and the danger prevention in information sphere, and also the optimal control of system of maintenance of information security and a rational choice...

  • Getting IT Right.  // Security: Solutions for Enterprise Security Leaders;Apr2000, Vol. 37 Issue 4, p23 

    Discusses the collaboration between security and information technology (IT) executives. Purchasing of software and hardware; Mission to secure an organization's computer and information assets; Security directors' responsibility for information protection and traditional physical security;...

  • Coevolution.  // Security: Solutions for Enterprise Security Leaders;Apr2000, Vol. 37 Issue 4, p24 

    Discusses the evolution of the partnership between security system directors and information technology (IT) managers. Acceleration of technology into the security; Integration of security systems; Tools shared by IT and security; Organizations' increased demand for the seamless integration of...

  • Secure By Design. Raikow, David // CIO Insight;Aug2008, Issue 96, p22 

    The article presents a process that will enable information technology (IT) professionals develop a security policy that will meet the needs of their business enterprises. It says that the first step in making a security policy is defining clear priorities based on an effective risk assessment....

  • A distributable security management architecture for enterprise systems spanning multiple security domains. Priggouris, Ioannis; Hadjiefthymiades, Stathes // Electronic Commerce Research;Jul2006, Vol. 6 Issue 3/4, p355 

    Administering security in modern enterprise systems may prove an extremely complex task. Their large scale and dynamic nature are the main factors that contribute to this fact. A robust and flexible model is needed in order to guarantee both the easy management of security information and the...

  • Climbing the Pixel Ladder without Falling Off. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Nov2011, Vol. 48 Issue 11, p106 

    The article discusses the importance of megapixel cameras as part of video surveillance from a security and business perspective. It provides a detailed account on the three essential factors when matching a megapixel camera to a location, specific need, or as part of the total system, these are...

  • DOES MY CYBERTERROR MATTER TO ANYONE? Dignan, Larry // Baseline;Sep2005, Issue 48, p26 

    Presents views on the threat posed by cyberterrorism to the information technology system of companies in the U.S. in 2005. Effect of lax security in technology system on businesses; Benefit from proper information security procedures; Ways of securing the information technology system of a...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics